Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future.
Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime. None of these categories are exclusive and many activities can be characterized as falling in one or more category. Even though it states that the computer crime is when something takes place when the computer or network is a necessary part of the crime, there are some terms that are used to include traditional crimes. Some of the traditional crimes are fraud, theft, blackmail, forgery, and embezzlement when the computers or networks are used to facilitate the illicit activity.
There are a lot of different criminal activities that can be considered computer crime. Some examples of these activities are misuse of devices, forgery (theft id), electronic fraud, illegal access (unauthorized access), Trojan horses, cyberterrorism, email abuse/harassment, and data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data) are just a few. Forgery is a computer crime that can be perpetrated using the hardware components of the computer without the usage of the internet. For example, using Microsoft Word to type my signature when I did not actually right it and neither did you but it is still a computer crime that you committed. A Trojan horse is when a seemlingly harmless item enters the computer, it could be through in the form of an email attachment, it could come through a router with an open port, etc. However, it releases codes that causes the computer to do whatever is written in the code. Cyberterroism is terrorism done using the computer in some sort of way. Email abuse/harassment is when people use the computer to harass you whereas prior to the computer it was done via regular mail.
The growth of computer crime rapidly started in the 1970’s. Although a lot of people don’t see it, it is becoming into a problem which involves and has influences on nearly every aspect of our modern society. Due to the influence of computer crime, it has definetly changed the political, economocial, cultural and also military aspects of our society.
There are a lot of crimes that are easier to commit when using a computer. Examples of the easy to commit crimes are fraud, false inputting, fake output, forgery, theft of information, and eavesdropping. These are just a few although there are more out there.
Some of the manipulation of computers include data files, attack on hardware, theft of software, comprised measuring devices, hacking by both employees...